SlideShare une entreprise Scribd logo
1  sur  25
(Subject) Computer system
(instructor) Sir Haroon
Group Member
• Ishtiaq Husain
• Zain Ul Abadin
• Adeel manaf
• Muhammad Awais
• Nouman Ahmad
Before Our topic....!!
Definition
Kali Linux is an operating system
Use for advanced Penetration Testing and Security Auditing
Named on Hindu god.
It was designed to replace the BackTrack Linux
Interface of Kali Linux
Mati Aharoni
Kali Linux Core Developers Mati Aharoni is the
lead Kali developer, trainer and founder of
Offensive Security. With over 10 years of
experience as a professional penetration tester, he
has uncovered several major security flaws and is
actively involved in the offensive security area.
Founders of Kali Linux
Devon Kearns
Devon Kearns (dookie) is an Offensive Security
instructor, Kali Linux developer, the administrator
of the Exploit Database, co-creator of the
Metasploit Unleashed project, fanatic, and co-
author of Penetration Tester’s Guide
Offensive security
Offensive Security is an organization that offers
Offensive Security certification Professional
(OSCP) is an ethical hacking certification that
teaches penetration testing for organization.
Hardware requirement
• A minimum of 20 GB disk space for the Kali
Linux install.
• RAM for i386 and amd64
architectures, minimum: 1GB, recommended
2GB or more.
• CD-DVD Drive / USB boot support
Installation of Kali
STEP 1 : Boot with your chosen medium or load the Kali
STEP 2 : Select your preferred language
STEP 3 : Select your geographical location
STEP 4 : Select the preferred keyboard
STEP 5 : Let kali be your hostname & hit continue
STEP 6 : Set a password for your Kali Machine & hit continue
Installation of Kali
STEP 7 : set your time zone.
STEP 8 : partitions of the disk.
STEP 9 : Configure network mirrors( it is use to supplement the
software that is included on cd room)
STEP 10:install GRUB(places the operating system (OS) of a computer into memory.)
STEP 11: Finally, click ,Continue to reboot into your new
Kali installation
What is source of earn of kali
developers…???
Feature of Kali
• Has more than 300 penetration testing tools.
• Multilingual Support
• Completely Customizable.
• Free and Always will be.
• Vast Wireless device support and Compatible
with USB
• ARM support
• Trustable Operating System
• Forensics Mode(recovery and investigation of
data )
Metasploit framework
• Metasploit framework best and no1 tool in kali
linux with backdooring attacks. Msf can target any
kind of system including windows, mac, linux,
android and even cctv cameras. Msf can generate
a backdoor and control the infected system with its
handler.
SQLmap
• in penetration testing most of the hackers tries to take
down a database in the first place while attacking a
web server. sqlmap is really powerful fully automated
auditing tool for attacking a database by exploiting a
server side sql vulnerability. Sqlmap comes with a
command line interface with cool green fonts.
• You just need to input the vulnerable link rest is fully
automated process
Reaver
• Reaver is the best and simple tool for wireless
penetration testing. Reaver targets a WPS
(Wireless protected setup) enabled router.
• This simple tool can crack wifi within a very
short time depending on the wps pin length.
Nmap 65535
• Nmap, also known as network mapper is a pretty
simple tool in Kali Linux that allows you to scan a
system or a network. Nmap allows you to scan
open ports, running.
• Nmap uses various type of detection technique to
check IP filters firewalls. Nmap has both command
line interface and GUI and supports almost all
platforms including windows and mac.
Hashcat
• Hashcat is an awesome piece of software that can crack
almost any kind of hash. Hashcat has two variants with
two different algorithms one is CPU cracking other one
is GPU cracking. HashCat uses the GPU cracking
algorithm which is very faster than traditional CPU
cracking. Unlike a CPU a GPU has too many number of
cores
Aircrack
• Aircrack is not just a tool its toolkit that is used for
wireless attacks or simply hacking a wifi
network. These set of tools allows you to monitor a
network, crack WPA hash, capture handshake.
• The most interesting part is this can be used as a wifi
jammer by sending unlimited false packet to a router
and thus disconnects all the connected devices.
Proxychains
• Proxychains is one of the most essential tools in kali
linux. Proxychains directs all traffic of a specific
application through a desired proxy server. Its can mask
the user’s identity and secure the user from
eavesdroppers. By default proxychains is set to connect
through tor proxy servers with more secure protocol
called SOCKS5.
Kali Vs. Ubuntu
Kali
 Kali Linux is a specialized
distribution.
 Kali is purely operate by
professional penetrator
 Primarily designed for
purposes like Penetration
Testing and Digital
Forensics.
 Developed by Offensive
Security Ltd. and released
on 13th March 2013.
Ubuntu
 Ubuntu is a general desktop
and server distribution.
 Ubuntu is more friendly to
Linux beginners
 Designed to satisfy general
desktop and Server
requirements and also targeted
in some Smart TV’s.
 Developed by Canonical Ltd.
and released back in 2004
Refrence
• http://www.en.wikipedia.org/wiki/Kali_Linuxwww.slideshare.net
• http://www.learncodeonline.in/blog/how-to-install-kali-lilnux
• https://tools.kali.org/tools-listing
• https://www.technotification.com/2017/06/kali-linux-tools-hacking-wifi.htm
• https://www.fossmint.com/kali-linux-hacking-andpenetration-tools/
• https://metasploit.help.rapid7.com/docs/msf-overview
• http://www.pearsonitcertification.com/articles/article.aspx?p=1868080
• https://superuser.com
“IT IS CRITICAL TO TAKE THE VIEW OF THE ATTACKER
TO SEE IF YOUR DEFENSES ARE WORKING”
Thank you

Contenu connexe

Tendances (20)

Kali linux
Kali linux Kali linux
Kali linux
 
Kali linux
Kali linuxKali linux
Kali linux
 
Tools kali
Tools kaliTools kali
Tools kali
 
Linux security
Linux securityLinux security
Linux security
 
Kali linux useful tools
Kali linux useful toolsKali linux useful tools
Kali linux useful tools
 
Kali linux and hacking
Kali linux  and hackingKali linux  and hacking
Kali linux and hacking
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 
Kali linux
Kali linuxKali linux
Kali linux
 
kali linux
kali linuxkali linux
kali linux
 
Metasploit
MetasploitMetasploit
Metasploit
 
Linux System Monitoring
Linux System Monitoring Linux System Monitoring
Linux System Monitoring
 
Kali linux summarised
Kali linux summarisedKali linux summarised
Kali linux summarised
 
Metasploit
MetasploitMetasploit
Metasploit
 
Kali Linux Installation - VMware
Kali Linux Installation - VMwareKali Linux Installation - VMware
Kali Linux Installation - VMware
 
Introduction to linux ppt
Introduction to linux pptIntroduction to linux ppt
Introduction to linux ppt
 
Linux commands
Linux commandsLinux commands
Linux commands
 
Iptables presentation
Iptables presentationIptables presentation
Iptables presentation
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
 
Linux introduction
Linux introductionLinux introduction
Linux introduction
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
 

Similaire à Kali presentation

Eliz seminar
Eliz seminar Eliz seminar
Eliz seminar henelpj
 
Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploitdevilback
 
Unleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a TwistUnleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a TwistFredReynolds2
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxAmitesh Bharti
 
Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...B.A.
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Mobodexter
 
01 Metasploit kung fu introduction
01 Metasploit kung fu introduction01 Metasploit kung fu introduction
01 Metasploit kung fu introductionMostafa Abdel-sallam
 
Phases of penetration testing
Phases of penetration testingPhases of penetration testing
Phases of penetration testingAbdul Rahman
 
Operating project
Operating projectOperating project
Operating projectISMAT CH
 
Ethical hacking : Beginner to advanced
Ethical hacking : Beginner to advancedEthical hacking : Beginner to advanced
Ethical hacking : Beginner to advancedKavin K
 
Essential Kali Linux Commands for Ethical Hacking.pdf
Essential Kali Linux Commands for Ethical Hacking.pdfEssential Kali Linux Commands for Ethical Hacking.pdf
Essential Kali Linux Commands for Ethical Hacking.pdfuzair
 
Linux Security Quick Reference Guide
Linux Security Quick Reference GuideLinux Security Quick Reference Guide
Linux Security Quick Reference Guidewensheng wei
 

Similaire à Kali presentation (20)

Eliz seminar
Eliz seminar Eliz seminar
Eliz seminar
 
kali linix
kali linixkali linix
kali linix
 
Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploit
 
Unleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a TwistUnleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a Twist
 
linux.pptx
linux.pptxlinux.pptx
linux.pptx
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
 
Kali kinux1
Kali kinux1Kali kinux1
Kali kinux1
 
Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
 
01 Metasploit kung fu introduction
01 Metasploit kung fu introduction01 Metasploit kung fu introduction
01 Metasploit kung fu introduction
 
Phases of penetration testing
Phases of penetration testingPhases of penetration testing
Phases of penetration testing
 
Operating project
Operating projectOperating project
Operating project
 
Ethical hacking : Beginner to advanced
Ethical hacking : Beginner to advancedEthical hacking : Beginner to advanced
Ethical hacking : Beginner to advanced
 
Essential Kali Linux Commands for Ethical Hacking.pdf
Essential Kali Linux Commands for Ethical Hacking.pdfEssential Kali Linux Commands for Ethical Hacking.pdf
Essential Kali Linux Commands for Ethical Hacking.pdf
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
 
Kalilinux
KalilinuxKalilinux
Kalilinux
 
Linux Security Quick Reference Guide
Linux Security Quick Reference GuideLinux Security Quick Reference Guide
Linux Security Quick Reference Guide
 
Linux quick reference
Linux quick reference Linux quick reference
Linux quick reference
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
 

Dernier

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 

Dernier (20)

Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 

Kali presentation

  • 1.
  • 3. Group Member • Ishtiaq Husain • Zain Ul Abadin • Adeel manaf • Muhammad Awais • Nouman Ahmad
  • 5.
  • 6. Definition Kali Linux is an operating system Use for advanced Penetration Testing and Security Auditing Named on Hindu god. It was designed to replace the BackTrack Linux
  • 8. Mati Aharoni Kali Linux Core Developers Mati Aharoni is the lead Kali developer, trainer and founder of Offensive Security. With over 10 years of experience as a professional penetration tester, he has uncovered several major security flaws and is actively involved in the offensive security area. Founders of Kali Linux
  • 9. Devon Kearns Devon Kearns (dookie) is an Offensive Security instructor, Kali Linux developer, the administrator of the Exploit Database, co-creator of the Metasploit Unleashed project, fanatic, and co- author of Penetration Tester’s Guide
  • 10. Offensive security Offensive Security is an organization that offers Offensive Security certification Professional (OSCP) is an ethical hacking certification that teaches penetration testing for organization.
  • 11. Hardware requirement • A minimum of 20 GB disk space for the Kali Linux install. • RAM for i386 and amd64 architectures, minimum: 1GB, recommended 2GB or more. • CD-DVD Drive / USB boot support
  • 12. Installation of Kali STEP 1 : Boot with your chosen medium or load the Kali STEP 2 : Select your preferred language STEP 3 : Select your geographical location STEP 4 : Select the preferred keyboard STEP 5 : Let kali be your hostname & hit continue STEP 6 : Set a password for your Kali Machine & hit continue
  • 13. Installation of Kali STEP 7 : set your time zone. STEP 8 : partitions of the disk. STEP 9 : Configure network mirrors( it is use to supplement the software that is included on cd room) STEP 10:install GRUB(places the operating system (OS) of a computer into memory.) STEP 11: Finally, click ,Continue to reboot into your new Kali installation
  • 14. What is source of earn of kali developers…???
  • 15. Feature of Kali • Has more than 300 penetration testing tools. • Multilingual Support • Completely Customizable. • Free and Always will be. • Vast Wireless device support and Compatible with USB • ARM support • Trustable Operating System • Forensics Mode(recovery and investigation of data )
  • 16. Metasploit framework • Metasploit framework best and no1 tool in kali linux with backdooring attacks. Msf can target any kind of system including windows, mac, linux, android and even cctv cameras. Msf can generate a backdoor and control the infected system with its handler.
  • 17. SQLmap • in penetration testing most of the hackers tries to take down a database in the first place while attacking a web server. sqlmap is really powerful fully automated auditing tool for attacking a database by exploiting a server side sql vulnerability. Sqlmap comes with a command line interface with cool green fonts. • You just need to input the vulnerable link rest is fully automated process
  • 18. Reaver • Reaver is the best and simple tool for wireless penetration testing. Reaver targets a WPS (Wireless protected setup) enabled router. • This simple tool can crack wifi within a very short time depending on the wps pin length.
  • 19. Nmap 65535 • Nmap, also known as network mapper is a pretty simple tool in Kali Linux that allows you to scan a system or a network. Nmap allows you to scan open ports, running. • Nmap uses various type of detection technique to check IP filters firewalls. Nmap has both command line interface and GUI and supports almost all platforms including windows and mac.
  • 20. Hashcat • Hashcat is an awesome piece of software that can crack almost any kind of hash. Hashcat has two variants with two different algorithms one is CPU cracking other one is GPU cracking. HashCat uses the GPU cracking algorithm which is very faster than traditional CPU cracking. Unlike a CPU a GPU has too many number of cores
  • 21. Aircrack • Aircrack is not just a tool its toolkit that is used for wireless attacks or simply hacking a wifi network. These set of tools allows you to monitor a network, crack WPA hash, capture handshake. • The most interesting part is this can be used as a wifi jammer by sending unlimited false packet to a router and thus disconnects all the connected devices.
  • 22. Proxychains • Proxychains is one of the most essential tools in kali linux. Proxychains directs all traffic of a specific application through a desired proxy server. Its can mask the user’s identity and secure the user from eavesdroppers. By default proxychains is set to connect through tor proxy servers with more secure protocol called SOCKS5.
  • 23. Kali Vs. Ubuntu Kali  Kali Linux is a specialized distribution.  Kali is purely operate by professional penetrator  Primarily designed for purposes like Penetration Testing and Digital Forensics.  Developed by Offensive Security Ltd. and released on 13th March 2013. Ubuntu  Ubuntu is a general desktop and server distribution.  Ubuntu is more friendly to Linux beginners  Designed to satisfy general desktop and Server requirements and also targeted in some Smart TV’s.  Developed by Canonical Ltd. and released back in 2004
  • 24. Refrence • http://www.en.wikipedia.org/wiki/Kali_Linuxwww.slideshare.net • http://www.learncodeonline.in/blog/how-to-install-kali-lilnux • https://tools.kali.org/tools-listing • https://www.technotification.com/2017/06/kali-linux-tools-hacking-wifi.htm • https://www.fossmint.com/kali-linux-hacking-andpenetration-tools/ • https://metasploit.help.rapid7.com/docs/msf-overview • http://www.pearsonitcertification.com/articles/article.aspx?p=1868080 • https://superuser.com
  • 25. “IT IS CRITICAL TO TAKE THE VIEW OF THE ATTACKER TO SEE IF YOUR DEFENSES ARE WORKING” Thank you